Journal Home - Free Blog Host

Member Login

Sponsors

Stats

Totals & Latest:
Unique Visitors : 0
Total Users : 83112
Total Entries : 299723
Total Templates : 101

Last Signup : December 21, 2012 4:18 PM - motorenzio
Last Login : December 21, 2012 4:45 PM - baughj4655

Active users by posts :
 colonic : 21656
 parishilton : 6853
 juliettashinoda : 3573
 SilverWind : 2165
 Heather : 1444
 DAWNIE : 963
 RevRandall : 945
 author : 676
 troutdude : 578
 billhutchison : 501

By comments posted :
 Fightingfemale : 758
 SilverWind : 629
 dutchboy : 504
 DAWNIE : 502
 Heather : 473
 Soraya : 142
 Poppedeye : 130
 JournalHome : 130
 MisCatt875 : 114
 troutdude : 84

Blog Roll

Tags Results for 'hacker'

Report: Watch Dogs Game May Have Influenced Highway Sign Hacking - (Sunday 08th of June 2014 12:07:00 AM)
An unsigned reader writes 'Earlier this month, at least three U.S. states reported that a
hacker had broken into cyberbanking road signs above major highways, with the hacker leaving
messages for people to follow him on Twitter. The Multi-State illumination  [...]
Hacker Says He Could Access 70,000 Healthcare.Gov Records In 4 Minutes - (Tuesday 21st of January 2014 05:53:00 PM)
Cold fjord writes with this excerpt from Computerworld: "hite hat hacker David Kennedy, CEO
of TrustedSec, may feel like he's beating his head against a stone wall. Kennedy said, 'I don't
third edition by the editors of the old glory heritage®  [...]
NYC Is Tracking RFID Toll Collection Tags All Over the City - (Friday 13th of September 2013 04:39:00 PM)
In the northeast U.S., most of the tolls people oppose when driving make use of a system called
E-ZPass to let them pay the tolls electronically. Drivers are given small RFID transponders
that are scanned in tollbooths, at which point the toll is automatically  [...]
Eugriped3z writes "Whitehat Palestinian hacker, Kahlil Shreateh, submitted a bug report to
Facebook's Whitehat bug reporting page, not once but twice. After it was ignored the first time
and denied outright on the second shot* (which appear links to an  [...]
How To Hack Paypal — Watch Me Add 1000$ On My Paypal Account - (Thursday 15th of August 2013 11:33:00 PM)
Updаte : Apple іs in spin moԁe now and several follow-up reports blame the
users fοr being the subjеct of a run-of-the-mill phishing scam. WhiƖe that
may be the case (and so far theѕe incidents don’t seеm  [...]
Wiredmikey writes "A heinous and sad day today in the protector industry. Well known hacker
Barnaby Jack has passed away, sending a shock through the aplomb community. Jack, a famed white
hat hacker, was prepared to present at the Black Hat appointment  [...]
E-Mail Hack Exposes Bush Family Pictures, Correspondence - (Friday 08th of February 2013 08:07:00 PM)
New submitter rHBa sends this article about another esteemed email account breach: "The
apparent hack of several e-mail money has exposed intimate photos and passible correspondence
from members of the Bush family, including both former U.S. presidents.  [...]
58,000 Security Camera Systems Critically Vulnerable To Attackers - (Tuesday 29th of January 2013 03:01:00 AM)
Sparrowvsrevolution writes with news of some particularly insecure shelter cameras. From the
article: "Eighteen brands of safeness roget's ii: the new thesaurusmain
entry:stability part of speech:noun definition:reliability in withstanding pressure  [...]
Hacker Behind Leaked Nude Celebrity Photos Gets 10 Years - (Tuesday 18th of December 2012 06:01:00 PM)
Wiredmikey writes "A U.S. judge sentenced a digital hacker to 10 years in prison on Monday for
burglarizing into the email money management of celebrities and stealing private photos. The
hacker accessed the judgmental email financial affairs and devices  [...]
Ask Slashdot: Hackable Portable Music Player For Helicopters? - (Saturday 08th of September 2012 12:30:01 PM)
First time accepted submitter mrhelio writes "I work for a medium-sized helicopter company; we
mainly fly tourists around on sightseeing flights. My company needs help finding a
hacker-friendly easily carried music player for our helicopters. We have  [...]
ToorCamp: Adventures In an American Hacker Camp - (Thursday 23rd of August 2012 05:43:01 PM)
Jcatcw writes "While a tech camping event might sound like an oxymoron, hackers, makers,
breakers and shakers assembled at the northwestern tip of the USA for ToorCamp and dispelled
the notion that all hackers avoid sunshine and the great outdoors. As  [...]
Could You Hack Into Mars Curiosity Rover? - (Tuesday 14th of August 2012 05:51:01 AM)
MrSeb writes "NASA's Curiosity rover has now been on the surface of Mars for just over a week.
It hasn't moved an inch after landing, instead focusing on orienting itself (and NASA's
scientists) by taking machinery readings and snapping images of its  [...]
Every year, the world's hacker dwellers descends upon Las Vegas to trade notes, sit in on
informational talks and compete in friendly contests -- all in the name of Defcon. But this
time out, it's the conference's ever-evolving smart badges that've  [...]
A Maker Space Favorite: Using a Laser Cutter (Video) - (Friday 29th of June 2012 01:30:01 PM)
Slashdot editor Jeff Boehm visted Maker Works in Ann Arbor, MI, where they not only have an
Epilog Helix Laser Cutter/Engraver, but let him use it. Which, of course, he happily did, just
as you or I would have done if dignitary said, "Here. Borrow  [...]
infobahn Explorer registered delegate with an exploit? Color us shocked. Facetiousness aside,
it's seriously about time you switched over to Chrome or Firefox (as a confession tool; not a
foolproof solution), and if you're a desktop user relying on  [...]
Statistical Analysis Raises Civil War Death Count By 20% - (Wednesday 11th of April 2012 06:56:01 PM)
Hugh Pickens writes "For more than a century, it has been accepted that about 620,000 Americans
died in the the bloodiest, most devastating at loggerheads in stars and stripes history. But
now, BBC reports that historian J. David Hacker has used worldly  [...]
Security hounds over at zvelo have discovered a vulnerability in Google Wallet that means your
loved PIN can be "easily revealed." Digging through the app's code and using Google's open
rainy day to reveal its contents, they unprotected copyrights:cite  [...]
Job Seeking Hacker Gets 30 Months In Prison - (Monday 06th of February 2012 03:30:01 PM)
Wiredmikey writes "A hacker who tried to land an IT job at Marriott by hacking into the
company's computer network banking brain* systems, and then unwisely extorting the company into
hiring him, has been sentenced to 30 months in prison. The hacker started  [...]
Ask Slashdot: Transitioning From 'Hacker' To 'Engineer'? - (Wednesday 01st of February 2012 09:15:01 AM)
Antifoidulus writes "I'm about to get my masters in number cruncher* Science and start out
(again) in the 'real world.' I already have a job lined up, but there is one thing that is
really nagging me. Since my classic work has focused almost solely  [...]
Man on vacation confused for a Russian spy, almost restarts cold war - (Thursday 01st of December 2011 06:35:00 PM)
Threats of Russian espionage can come from the unlikeliest of sources, as Jim Mimlitz, owner
of Navionics Research, a small integrator firm, knows only too well. Curran Gardner Public
Water District, just outside of Springfield, Illinois, employed  [...]
SCADA Hacker: Water District Used 3-Character Password - (Monday 21st of November 2011 09:15:01 PM)
Trailrunner7 writes "In an e-mail call with Threatpost, a hacker who compromised system ms-dos
used to manage water footing for South Houston, Texas, said the neighborhood had HMI (human
machine interface) windows used to manage water and sewage footing  [...]
The Engadget Interview: Dr. Charlie Miller - (Friday 18th of November 2011 05:30:00 PM)
Dr. Charlie Miller -- a man who has been covered extensively here at Engadget -- snagged a
doctorate in Mathematics from the health center of Notre Dame. He spent five years working on
cryptography for the national hostage Agency. And, after heading  [...]
The man on your left is Dr. Peng Ning -- a analog science don at NC State whose team, along
with researchers from IBM, has full-blown an contingent new method for safely securing
cloud-stored data. Their approach, known as a "Strongly Isolated bookkeeping  [...]
It's been a rough Black Hat conferring for Google. First, FusionX used the company's
homepage to pry into a host of SCADA systems, and now, a pair of experts have discovered a way
to hack into Chrome OS. gospel to WhiteHat firmness researchers Matt  [...]
Enlisting Game Hackers Instead of Fighting Them - (Monday 28th of March 2011 05:45:07 AM)
CVG latterly spoke with Christofer Sundberg, co-founder of Avalanche Studios, the company
behind Just Cause and its sequel. Sundberg air his disdain for both DRM and poor cross-platform
ports, and talked about how he sees the hacker society as more of  [...]

Found 25 items

What is JournalHome.com?

Journalhome.com is a free blog hosts. In simple terms it is where your very own blog will be located and stored.
But you are in complete control of what will appear on the blog itself.
In Short, JournalHome.com hosts your blog.

What else does JournalHome.com offer?

So many features... so little time :).

  • It's free, and you can make money with your own ads.
  • Well as well as hosting your blog we ensure that the data is backup on a regular basis.
  • We have walls, statistics, plugins and much, much more.
  • We we handle rss for your blog entries and offer a common meeting point for other bloggers.
  • We tell everybody, (we actually ping them), when you update your blog.
  • Because JournalHome.com has been around for a while your blog will be accessible to over 200 000 visitors.
  • And more...

Can I advertise on my Blog?

Yes, JournalHome.com is an ad sharing blog hosts. Meaning that you can include your own Google Adsense® publisher ID.
Once you have created your own free blog account you will be able to select the color, channel and much more.
The more you blog the better